2026 Best Software Awards are here!See the list

Top Free Malware Analysis Tools

Check out our list of free Malware Analysis Tools. Products featured on this list are the ones that offer a free trial version. As with most free versions, there are limitations, typically time or features.

If you'd like to see more products and to evaluate additional feature options, compare all Malware Analysis Tools to ensure you get the right product.

View Free Malware Analysis Tools

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.
12 Malware Analysis Tools Products Available
(931)4.6 out of 5
Optimized for quick response
1st Easiest To Use in Malware Analysis Tools software
View top Consulting Services for ESET PROTECT
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

    Users
    • IT Manager
    • Network Administrator
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 48% Small-Business
    • 46% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ESET PROTECT features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.6
    Malware Evaluation
    Average: 9.0
    9.5
    Malware Detection
    Average: 9.1
    9.5
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • FP
    It's a very reliable platform that works flawlessly. It allows you to easily manage all your devices from a single console. The best feature I've... Read review
    SG
    I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ESET
    Company Website
    Year Founded
    1992
    HQ Location
    Bratislava, Slovak Republic
    Twitter
    @ESET
    276,951 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,944 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Stay one step ahead of known and emerging cyber threats with our AI-native, prevention-first approach. ESET combines the power of AI and human expertise to make protection easy and effective. Expe

Users
  • IT Manager
  • Network Administrator
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 48% Small-Business
  • 46% Mid-Market
ESET PROTECT features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.6
Malware Evaluation
Average: 9.0
9.5
Malware Detection
Average: 9.1
9.5
File Analysis
Average: 9.0
FP
It's a very reliable platform that works flawlessly. It allows you to easily manage all your devices from a single console. The best feature I've... Read review
SG
I use ESET PROTECT for software and device protection as it safeguards files, folders, and scans them for threats. It ensures a stable and reliable... Read review
Seller Details
Seller
ESET
Company Website
Year Founded
1992
HQ Location
Bratislava, Slovak Republic
Twitter
@ESET
276,951 Twitter followers
LinkedIn® Page
www.linkedin.com
1,944 employees on LinkedIn®
(196)4.7 out of 5
3rd Easiest To Use in Malware Analysis Tools software
Entry Level Price:Contact Us
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ANY.RUN's Interactive Sandbox is a cloud-based service for in-depth malware analysis. It offers visibility into threat behavior based on interactivity that allows you to detonate threats, fine-tune an

    Users
    • Security Analyst
    • Cyber Security Analyst
    Industries
    • Computer & Network Security
    • Information Technology and Services
    Market Segment
    • 31% Enterprise
    • 31% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ANY.RUN Sandbox features and usability ratings that predict user satisfaction
    9.2
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 9.0
    9.1
    Malware Detection
    Average: 9.1
    9.3
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Miroslav H.
    MH
    I appreciate the ANY.RUN sandbox system because it functions like an online system, similar to a Docker or TryHackMe machine. This provides a... Read review
    TOUBA H.
    TH
    I find ANY.RUN Sandbox incredibly valuable as it allows me to safely detonate suspicious files or URLs and observe real-time behavior, which is... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    ANY.RUN
    Company Website
    Year Founded
    2016
    HQ Location
    Dubai, United Arab Emirates
    Twitter
    @anyrun_app
    31,899 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    375 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ANY.RUN's Interactive Sandbox is a cloud-based service for in-depth malware analysis. It offers visibility into threat behavior based on interactivity that allows you to detonate threats, fine-tune an

Users
  • Security Analyst
  • Cyber Security Analyst
Industries
  • Computer & Network Security
  • Information Technology and Services
Market Segment
  • 31% Enterprise
  • 31% Mid-Market
ANY.RUN Sandbox features and usability ratings that predict user satisfaction
9.2
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 9.0
9.1
Malware Detection
Average: 9.1
9.3
File Analysis
Average: 9.0
Miroslav H.
MH
I appreciate the ANY.RUN sandbox system because it functions like an online system, similar to a Docker or TryHackMe machine. This provides a... Read review
TOUBA H.
TH
I find ANY.RUN Sandbox incredibly valuable as it allows me to safely detonate suspicious files or URLs and observe real-time behavior, which is... Read review
Seller Details
Seller
ANY.RUN
Company Website
Year Founded
2016
HQ Location
Dubai, United Arab Emirates
Twitter
@anyrun_app
31,899 Twitter followers
LinkedIn® Page
www.linkedin.com
375 employees on LinkedIn®
G2 Advertising
Sponsored
G2 Advertising
Get 2x conversion than Google Ads with G2 Advertising!
G2 Advertising places your product in premium positions on high-traffic pages and on targeted competitor pages to reach buyers at key comparison moments.
(231)4.7 out of 5
Optimized for quick response
2nd Easiest To Use in Malware Analysis Tools software
Entry Level Price:Starting at $9.50
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

    Users
    • IT Manager
    • IT Director
    Industries
    • Non-Profit Organization Management
    • Financial Services
    Market Segment
    • 57% Mid-Market
    • 36% Small-Business
    User Sentiment
    How are these determined?Information
    These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
    • Coro Cybersecurity is a product that provides a variety of cybersecurity functions through a single dashboard, including end user security, email security, and device security.
    • Users frequently mention the ease of use, the intuitive design, the quick setup, and the dedicated customer support as standout features of Coro Cybersecurity.
    • Users reported issues with the sensitivity of detection leading to false positives, compatibility issues with some macOS versions, and a desire for more individual configuration options and additional features.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Coro Cybersecurity features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.3
    Malware Evaluation
    Average: 9.0
    9.6
    Malware Detection
    Average: 9.1
    9.4
    File Analysis
    Average: 9.0
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Coronet
    Company Website
    Year Founded
    2014
    HQ Location
    Chicago, IL
    Twitter
    @coro_cyber
    1,905 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    324 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Coro is the easy cybersecurity company. We designed an all-in-one platform that every lean IT team will master. While other solutions scare people into buying complicated, confusing products, we lead

Users
  • IT Manager
  • IT Director
Industries
  • Non-Profit Organization Management
  • Financial Services
Market Segment
  • 57% Mid-Market
  • 36% Small-Business
User Sentiment
How are these determined?Information
These insights, currently in beta, are compiled from user reviews and grouped to display a high-level overview of the software.
  • Coro Cybersecurity is a product that provides a variety of cybersecurity functions through a single dashboard, including end user security, email security, and device security.
  • Users frequently mention the ease of use, the intuitive design, the quick setup, and the dedicated customer support as standout features of Coro Cybersecurity.
  • Users reported issues with the sensitivity of detection leading to false positives, compatibility issues with some macOS versions, and a desire for more individual configuration options and additional features.
Coro Cybersecurity features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.8
9.3
Malware Evaluation
Average: 9.0
9.6
Malware Detection
Average: 9.1
9.4
File Analysis
Average: 9.0
Seller Details
Seller
Coronet
Company Website
Year Founded
2014
HQ Location
Chicago, IL
Twitter
@coro_cyber
1,905 Twitter followers
LinkedIn® Page
www.linkedin.com
324 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

    Users
    No information available
    Industries
    • Computer & Network Security
    Market Segment
    • 50% Mid-Market
    • 35% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Threat Zone features and usability ratings that predict user satisfaction
    9.6
    Has the product been a good partner in doing business?
    Average: 8.8
    9.0
    Malware Evaluation
    Average: 9.0
    9.0
    Malware Detection
    Average: 9.1
    9.2
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Rahul J.
    RJ
    I liked the simple user interface and ease with which I could get things started on the website. The static and dynamic options are beneficial and... Read review
    Daniel E.
    DE
    I like that threat zone has a free plan to help people decide whether or not it is good an theyd like to use it Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Malwation
    Year Founded
    2020
    HQ Location
    Delaware, US
    Twitter
    @malwation
    1,034 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    13 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Threat.Zone is a a holistic malware platform that is hypervisor-based, automated and interactive tool for analyzing malware, so you can fight new generation malwares by conducting: Real-time behaviora

Users
No information available
Industries
  • Computer & Network Security
Market Segment
  • 50% Mid-Market
  • 35% Enterprise
Threat Zone features and usability ratings that predict user satisfaction
9.6
Has the product been a good partner in doing business?
Average: 8.8
9.0
Malware Evaluation
Average: 9.0
9.0
Malware Detection
Average: 9.1
9.2
File Analysis
Average: 9.0
Rahul J.
RJ
I liked the simple user interface and ease with which I could get things started on the website. The static and dynamic options are beneficial and... Read review
Daniel E.
DE
I like that threat zone has a free plan to help people decide whether or not it is good an theyd like to use it Read review
Seller Details
Seller
Malwation
Year Founded
2020
HQ Location
Delaware, US
Twitter
@malwation
1,034 Twitter followers
LinkedIn® Page
www.linkedin.com
13 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 90% Small-Business
    • 10% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    10.0
    Malware Detection
    Average: 9.1
    10.0
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Levan K.
    LK
    It is really easy to configure, user-friendly environment, easy to setup users and global policies, very easy to manage and for users to see if... Read review
    Sudeep J.
    SJ
    Considering the increased security threats these days specially in terms of malware sent as attachments in various formats it is imperative to have... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    odix
    Year Founded
    2012
    HQ Location
    Rosh Haain, Israel
    Twitter
    @odix
    6 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    18 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

FileWall is a must-have native security solution for Microsoft 365 and provides the ultimate protection against file-based cyber-attacks for Microsoft 365 business applications. Leveraging odix’s pate

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 90% Small-Business
  • 10% Mid-Market
FileWall for Microsoft 365 features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
10.0
Malware Detection
Average: 9.1
10.0
File Analysis
Average: 9.0
Levan K.
LK
It is really easy to configure, user-friendly environment, easy to setup users and global policies, very easy to manage and for users to see if... Read review
Sudeep J.
SJ
Considering the increased security threats these days specially in terms of malware sent as attachments in various formats it is imperative to have... Read review
Seller Details
Seller
odix
Year Founded
2012
HQ Location
Rosh Haain, Israel
Twitter
@odix
6 Twitter followers
LinkedIn® Page
www.linkedin.com
18 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 89% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ReversingLabs features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    9.4
    Malware Evaluation
    Average: 9.0
    8.8
    Malware Detection
    Average: 9.1
    8.6
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    It's really easy to use and help me to maintain save my pc. I used to use it a lot every day, and I fell constable using it. It was easy to... Read review
    TM
    RL has an industry leading, humongous repository of both known bad (malware) and known good files (it's critical to have both). At the time of this... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2009
    HQ Location
    Cambridge, US
    Twitter
    @ReversingLabs
    6,948 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    328 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

ReversingLabs is the trusted name in file and software security. We provide the modern cybersecurity platform to verify and deliver safe binaries. Trusted by the Fortune 500 and leading cybersecurity

Users
No information available
Industries
No information available
Market Segment
  • 89% Small-Business
ReversingLabs features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
9.4
Malware Evaluation
Average: 9.0
8.8
Malware Detection
Average: 9.1
8.6
File Analysis
Average: 9.0
Verified User in Financial Services
UF
It's really easy to use and help me to maintain save my pc. I used to use it a lot every day, and I fell constable using it. It was easy to... Read review
TM
RL has an industry leading, humongous repository of both known bad (malware) and known good files (it's critical to have both). At the time of this... Read review
Seller Details
Year Founded
2009
HQ Location
Cambridge, US
Twitter
@ReversingLabs
6,948 Twitter followers
LinkedIn® Page
www.linkedin.com
328 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

    Users
    • IT Manager
    Industries
    • Information Technology and Services
    Market Segment
    • 49% Mid-Market
    • 44% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Integrated Email Security features and usability ratings that predict user satisfaction
    7.6
    Has the product been a good partner in doing business?
    Average: 8.8
    10.0
    Malware Evaluation
    Average: 9.0
    8.3
    Malware Detection
    Average: 9.1
    8.3
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Automotive
    AA
    Removes the headache of having to manage on-prem spam filter. Read review
    RW
    You can call support and get a real person. Whether or not they know what they are talking about that is the question! It's a mixed bag as always. Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Todays zero-day threats, polymorphic malware and weaponized attachments demand a sophisticated multi-layered approach to keep businesses safe. VIPRE Email Security and suite of add-on solutions, del

Users
  • IT Manager
Industries
  • Information Technology and Services
Market Segment
  • 49% Mid-Market
  • 44% Small-Business
VIPRE Integrated Email Security features and usability ratings that predict user satisfaction
7.6
Has the product been a good partner in doing business?
Average: 8.8
10.0
Malware Evaluation
Average: 9.0
8.3
Malware Detection
Average: 9.1
8.3
File Analysis
Average: 9.0
Verified User in Automotive
AA
Removes the headache of having to manage on-prem spam filter. Read review
RW
You can call support and get a real person. Whether or not they know what they are talking about that is the question! It's a mixed bag as always. Read review
Seller Details
Company Website
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,316 Twitter followers
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 86% Enterprise
    • 14% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VMRay features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    8.7
    Malware Evaluation
    Average: 9.0
    9.0
    Malware Detection
    Average: 9.1
    8.7
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Verified User in Financial Services
    UF
    Safe and secure sandbox with multiple ways to submit. Read review
    Verified User in Pharmaceuticals
    AP
    The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    VMRay
    Company Website
    Year Founded
    2013
    HQ Location
    Bochum, DE
    Twitter
    @vmray
    4,042 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    115 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Sandboxing reinvented against the threats of today - and tomorrow. At VMRay, our purpose is to liberate the world from undetectable digital threats. Led by reputable cyber security pioneers, we dev

Users
No information available
Industries
No information available
Market Segment
  • 86% Enterprise
  • 14% Small-Business
VMRay features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
8.7
Malware Evaluation
Average: 9.0
9.0
Malware Detection
Average: 9.1
8.7
File Analysis
Average: 9.0
Verified User in Financial Services
UF
Safe and secure sandbox with multiple ways to submit. Read review
Verified User in Pharmaceuticals
AP
The VMRay platform is robust and capable at detecting a variety of threats, and is certainly a leader in malware sandbox tech. Their customer... Read review
Seller Details
Seller
VMRay
Company Website
Year Founded
2013
HQ Location
Bochum, DE
Twitter
@vmray
4,042 Twitter followers
LinkedIn® Page
www.linkedin.com
115 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

    Users
    No information available
    Industries
    • Information Technology and Services
    • Internet
    Market Segment
    • 88% Small-Business
    • 8% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • BitNinja features and usability ratings that predict user satisfaction
    8.9
    Has the product been a good partner in doing business?
    Average: 8.8
    6.7
    Malware Evaluation
    Average: 9.0
    8.3
    Malware Detection
    Average: 9.1
    8.3
    File Analysis
    Average: 9.0
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Alessandro C.
    AC
    It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
    OM
    Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Debrecen
    Twitter
    @bitninjaio
    1,085 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    23 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

State-of-the-art server security with an all-in-one platform BitNinja offers an advanced server security solution with a proactive and unified system designed to effectively defend against a wide ran

Users
No information available
Industries
  • Information Technology and Services
  • Internet
Market Segment
  • 88% Small-Business
  • 8% Mid-Market
BitNinja features and usability ratings that predict user satisfaction
8.9
Has the product been a good partner in doing business?
Average: 8.8
6.7
Malware Evaluation
Average: 9.0
8.3
Malware Detection
Average: 9.1
8.3
File Analysis
Average: 9.0
Alessandro C.
AC
It require almost no modification in your current software and infrastructure, very little impact on performance during normal operation Read review
OM
Firewalls are a primary line of defense for networked environments. With multiple modules Bitninja offers the best defense currently on the market.... Read review
Seller Details
Year Founded
2014
HQ Location
Debrecen
Twitter
@bitninjaio
1,085 Twitter followers
LinkedIn® Page
www.linkedin.com
23 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
    10.0
    Has the product been a good partner in doing business?
    Average: 8.8
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • What G2 Users Think
    Expand/Collapse What G2 Users Think
  • Adam B.
    AB
    The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2020
    HQ Location
    Salt Lake City, US
    Twitter
    @alphamountainai
    52 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    14 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Domain and IP Threat Intelligence feeds enable cybersecurity vendors and security operations to make their products and teams faster and more secure. By utilizing machine learning to assess the risk a

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Small-Business
Domain and IP Intelligence Feeds features and usability ratings that predict user satisfaction
10.0
Has the product been a good partner in doing business?
Average: 8.8
0.0
No information available
0.0
No information available
0.0
No information available
Adam B.
AB
The team were friendly, easy to work with and the intelligence feed works well, providing reliable, high quality output. We compared the web... Read review
Seller Details
Year Founded
2020
HQ Location
Salt Lake City, US
Twitter
@alphamountainai
52 Twitter followers
LinkedIn® Page
www.linkedin.com
14 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2022
    HQ Location
    Wilmington, US
    Twitter
    @doc_guard
    6,325 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DOCGuard is a cutting-edge cybersecurity solution specializing in detecting and analyzing malicious documents. Utilizing advanced structural analysis techniques, DOCGuard identifies threats in Office

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
DOCGUARD Groundbreaking Malware Analysis Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
2022
HQ Location
Wilmington, US
Twitter
@doc_guard
6,325 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

    We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1994
    HQ Location
    Clearwater, FL
    Twitter
    @VIPRESecurity
    8,316 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    225 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

VIPRE Endpoint Detection & Response (EDR) provides powerful endpoint threat detection with intuitive and actionable incident management and threat visualization in the console. Built on top of our

We don't have enough data from reviews to share who uses this product. Leave a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
VIPRE Endpoint Detection & Response features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Year Founded
1994
HQ Location
Clearwater, FL
Twitter
@VIPRESecurity
8,316 Twitter followers
LinkedIn® Page
www.linkedin.com
225 employees on LinkedIn®